CVE-2024-39181

6.5 MEDIUM

📋 TL;DR

A buffer overflow vulnerability exists in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 routers version 3.2. Attackers can exploit this by sending a specially crafted POST request to the ApCliSsid parameter, causing a Denial of Service (DoS) that crashes the device. Organizations using these specific router models are affected.

💻 Affected Systems

Products:
  • Shenzhen Libituo Technology Co., Ltd LBT-T300
  • Shenzhen Libituo Technology Co., Ltd LBT-T400
Versions: v3.2
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the vulnerable firmware version; other versions may be safe.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, potentially disrupting all network services until manual intervention.

🟠

Likely Case

Temporary service disruption affecting connected clients until device automatically reboots or is manually restarted.

🟢

If Mitigated

No impact if device is patched or network controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted POST request to the vulnerable endpoint; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check vendor website for firmware updates; if available, download and install following vendor instructions.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected routers from untrusted networks to prevent exploitation.

Access Control Lists

all

Implement firewall rules to block POST requests to the vulnerable endpoint.

🧯 If You Can't Patch

  • Replace affected devices with patched or alternative models.
  • Monitor network traffic for exploitation attempts and implement intrusion detection.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI; if version is v3.2, device is vulnerable.

Check Version:

Check via device web interface or vendor-specific CLI commands.

Verify Fix Applied:

Verify firmware version is updated to a version later than v3.2.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to router management interface
  • Device crash/reboot logs

Network Indicators:

  • POST requests with oversized ApCliSsid parameter to router IP

SIEM Query:

source_ip="router_ip" AND http_method="POST" AND uri_contains="generate_conf_router" AND parameter_size>threshold

🔗 References

📤 Share & Export